CryptoNote Protocol · Layer 1

Privacy is not
a feature. It's
the foundation.

Incognito is a Layer 1 blockchain built on CryptoNote protocol with WhirlpoolX proof-of-work. Every transaction is private by default, untraceable, and unlinkable.

888,888,888
Total Supply
720 / day
Block Reward
512-bit
Hash Digest
10 rounds
Cipher Rounds

Coin Specifications

A fair-launch Layer 1 cryptocurrency built for privacy from the ground up. No pre-mine, no ICO, no VCs.

Total Supply

888,888,888 INC hard-capped. No inflation, no hidden minting. The supply is finite and verifiable.

Live

Block Reward

720 INC distributed per day across miners. Consistent, predictable emission schedule for fair distribution.

Live

Mining Pools

Community mining pools are currently under development. WhirlpoolX PoW ensures ASIC-resistant mining.

Soon

Exchanges

Exchange listings are being pursued. Trade INC on centralized and decentralized platforms soon.

Soon

Social

Join the growing Incognito community. Official social channels and communication platforms launching soon.

Soon

Block Explorer

Live on-chain data viewer at scan.incognitolayer.pro. Verify blocks, transactions, and network stats.

Live

WhirlpoolX Algorithm

A modified Whirlpool hash function using Miyaguchi-Preneel construction with an extra XOR pass for ASIC resistance.

  whirlpoolx.spec
// WhirlpoolX Configuration
origin: "Barreto & Rijmen, 2000"
base: "Whirlpool Hash Function"
block_size: 512 bits
digest_size: 512 bits
structure: "Miyaguchi-Preneel"
cipher: "W (AES-like)"
rounds: 10

// Modifications
mod: "Extra XOR operation"
goal: "Break ASIC compatibility"
derived_from: "Vanillacoin / Vcash"

// Round Transformations
steps: [
  "SubBytes",
  "ShiftColumns",
  "MixRows",
  "AddRoundKey"
]

AES-Like Structure

Uses SubBytes, ShiftColumns, MixRows, and AddRoundKey transformations across 10 rounds, providing strong diffusion and confusion.

Miyaguchi-Preneel

A provably secure compression function construction that applies a dedicated block cipher (W) to achieve collision resistance.

Extra XOR Scramble

The WhirlpoolX modification adds an extra XOR operation to the output, breaking compatibility with existing Whirlpool ASIC implementations.

ASIC Resistance

Designed to keep mining accessible to GPU and CPU miners by resisting specialized hardware optimization.

CryptoNote Protocol

Four cryptographic pillars ensure every transaction on Incognito is private, untraceable, and unlinkable by default.

01

Ring Signatures

When you send funds, your signature is mixed with a group of possible signers (decoys). This makes it computationally infeasible to determine which input actually belongs to you.

02

Stealth Addresses

Each transaction uses a one-time public key derived from the recipient's address. Even if you receive multiple payments, they cannot be linked together on the blockchain.

03

Key Images

Uses cryptographic markers derived from your private key. Each spend produces a unique key image that can only appear once in the blockchain, preventing double spends while preserving anonymity.

04

Adaptive Parameters

Block size dynamically adjusts based on demand instead of being fixed. Mining difficulty adjusts automatically to maintain consistent block times across the network.

Why Layer 1 Matters

Privacy is built into the base layer, not added later. Unlike Bitcoin or Ethereum where privacy is attempted via Layer 2 protocols or mixers, Incognito's design means every single transaction is private-by-default, enforced by consensus at the protocol level.

Resources

Explore the project, verify on-chain data, and get involved.